1.9 CVE-2025-47729
CISA Kev Catalog
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
https://nvd.nist.gov/vuln/detail/CVE-2025-47729
Categories
CWE-912 : Hidden Functionality
Hidden functionality can take many forms, such as intentionally malicious code, "Easter Eggs" that contain extraneous functionality such as games, developer-friendly shortcuts that reduce maintenance or support costs such as hard-coded accounts, etc. From a security perspective, even when the functionality is not intentionally malicious or damaging, it can increase the product's attack surface and expose additional weaknesses beyond what is already exposed by the intended functionality. Even if it is not easily accessible, the hidden functionality could be useful for attacks that modify the control flow of the application.
CWE-NVD-Other
References
cve@mitre.org
https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-... Press/Media Coverage |
https://news.ycombinator.com/item?id=43909220 Press/Media Coverage |
https://www.theregister.com/2025/05/05/telemessage_investigating/ Press/Media Coverage |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:telemessage:text_message_archiver:*:*:*:*:*:*:*:* | <= 2025-05-05 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
133 | Try All Common Switches |
Medium |
190 | Reverse Engineer an Executable to Expose Assumed Hidden Functionality |
Low |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.